Cyber Crime Full Ppt

download Cyber Crime Full Ppt

of 16

Transcript of Cyber Crime Full Ppt

  • 8/2/2019 Cyber Crime Full Ppt

    1/16

    --PAPER PRESENTATION--

    ON

    CYBER CRIME

  • 8/2/2019 Cyber Crime Full Ppt

    2/16

    PRESENTATION OVERVIEW

    WHAT IS CYBER CRIME..??!

    TYPES OF CYBER CRIMES..

    OCCURRENCE..

    WHY LEARN ABOUT CYBER

    CRIME..

    CYBER CRIMINALS..

    MEASURES TO BE TAKEN..

  • 8/2/2019 Cyber Crime Full Ppt

    3/16

    WHAT IS CYBER CRIME..??!

    Cyber crime, also called

    computer crime, is any illegal behavior

    directed by means of electronic operationsthat targets the security of computer systems

    and the data processed .

    The concept of cyber crime is not

    radically different from the concept ofconventional crime.

  • 8/2/2019 Cyber Crime Full Ppt

    4/16

    TYPES OF CYBER CRIMES.(This is not exhaustive list of cyber crime)

    HACKING VIRUS DISSEMINATION

    SOFTWARE PIRACY

    CREDITCARDFRAUD NETEXTORTION

    CYBERDEFAMATION

  • 8/2/2019 Cyber Crime Full Ppt

    5/16

    2..VIRUS DISSEMINATION MALICIOUS SOFTWARE THAT ATTACHES ITSELF TO

    OTHER SOFTWARE..

    (VIRUS,, WORMS,, TROJAN HORSE,, TIME BOMB,

    LOGIC BOMB, RABBIT AND BACTERIUM ARE THE

    MALICIOUS SOFTWARES )

    1..HACKINGHacking in simple terms means illegalintrusion into a computer system without thepermission of the computer owner/user.

  • 8/2/2019 Cyber Crime Full Ppt

    6/16

    4..CREDIT CARD FRAUD

    3..SOFTWAREPIRACY Theft of software through the illegal copying of genuineprograms or the counterfeiting and distribution of productsintended to pass for the original..

    If electronic transactions are not secured the creditcard numbers can be stolen by the hackers who canmisuse this card by

    impersonating the credit card owner.

  • 8/2/2019 Cyber Crime Full Ppt

    7/16

    6..CYBER DEFAMATION

    THE CRIMINAL SENDS EMAILS CONTAININGDEFAMATORY MATTERS TO ALL CONCERNED OFF

    THE VICTIM OR POST THE DEFAMATORY

    MATTERS ON A WEBSITE..

    5..NETEXTORTION Copying the companys confidential data in order to extort saidcompany for huge amount..

  • 8/2/2019 Cyber Crime Full Ppt

    8/16

    WHERE DO THEY OCCUR..???

    Military and Intelligence Attacks

    Business Attacks

    Financial Attacks

    Terrorist Attacks

    Grudge Attacks

    Fun Attacks

  • 8/2/2019 Cyber Crime Full Ppt

    9/16

  • 8/2/2019 Cyber Crime Full Ppt

    10/16

    Why learn about CYBER CRIME?

    Because

    Everybody is using COMPUTERS..

    From white collar criminals to terrorist organizationsAnd

    fromTeenagers toAdults

    Conventional crimes like Forgery,, extortion,, kidnappiing

    etc.. are being committed with the help off computers

    New generation is growing up with computers

    MOST IMPORTANT -Monetary transactions

    are moving on to the IINTERNET

  • 8/2/2019 Cyber Crime Full Ppt

    11/16

    WHY CRIMES ARE NOT

    REPORTED? 56% of crimes NOT REPORTED

    Embarrassment.

    loss of public confidence

    False arrest concerns

  • 8/2/2019 Cyber Crime Full Ppt

    12/16

    CYBER CRIMINALS:

    Children and adolescents between the age

    group of18 years

    Business Rival..

    Political Hacktivist..

    Professional Hackers..

    Disgruntled employees..

  • 8/2/2019 Cyber Crime Full Ppt

    13/16

    MEASURES TO BE TAKEN...

    Use anti-virus software andfirewalls - keep them up todate

    Keep your operating systemup to date with critical securityupdates and patches

    Don't open emails or attachmentsfrom unknown sources

    Use hard-to-guess passwords.

    Dont use words found in adictionary. Remember thatpassword cracking tools exist

    Back-up your computer data ondisks or CDs often

    Don't share access to your computerswith strangers

    If you have a wi-fi network,password protect it

    Disconnect from the Internet whennot in use

    Reevaluate your security on a regularbasis

    Make sure your employees andfamily members know this info too!

  • 8/2/2019 Cyber Crime Full Ppt

    14/16

    CONCLUSION...

    Cyberspace has emerged as a national-levelconcern through several events ..Therefore, this

    needs to be given equal concern as the other

    major crimes. we need to be aware and alertduring our interaction with the computer.alrecent events

  • 8/2/2019 Cyber Crime Full Ppt

    15/16

    BIBLIOGRAPHY.!!

    http://www.ifccfbi.gov - operation web

    snare latest cyber crimes to be aware of

    www.cybercellmumbai.com

    ComputersToday.(Web CommerceTechnology.)

  • 8/2/2019 Cyber Crime Full Ppt

    16/16

    THANK YOU!!